VMware ESX 4.0, Patch ESX400-200911234-SG: Updates xml2 (1014851)
Summaries and Symptoms
Issues fixed in this patch (and their relevant symptoms, if applicable) include:
- Updates libxml2.
- This fix includes updated libxml2 packages that fix security issues in the ESX service console.
This fixes a stack overflow flaw found in the way libxml processes the root XML document element definition in a DTD. A remote attacker could provide an XML file that if opened by a local user, might cause a denial of service application failure. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-2414 to this issue.
This fixes multiple use-after-free flaws found in the way libxml parses the Notation and Enumeration attribute types. A remote attacker could provide an XML file that if opened by a local user, might cause a denial of service application failure. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-2416 to this issue.
For a complete list of the issues fixed in ESX 4.0 Update 1, see the ESX 4.0 Update 1 Release Notes.
None beyond the required patch bundles and reboot information listed in the table above.
Patch Download and Installation
See the VMware vCenter Update Manager Administration Guide for instructions on using Update Manager to download and install patches to automatically update ESX 4.0 hosts.
To update ESX 4.0 hosts when not using Update Manager, download the patch zip file from http://support.vmware.com/selfsupport/download/ and install the bulletin using esxupdate from the command line of the host. For more information, see the ESX 4 Patch Management Guide.